Sciweavers

1825 search results - page 54 / 365
» Cryptographic Securities Exchanges
Sort
View
115
Voted
TIT
2011
126views more  TIT 2011»
14 years 10 months ago
The Return of the Cryptographic Boomerang
—The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ci...
Sean Murphy
EUROCRYPT
2001
Springer
15 years 8 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
131
Voted
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
15 years 7 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
215
Voted
NIPS
2004
15 years 4 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
IWSEC
2009
Springer
15 years 10 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto